Spdk/lib/mlx5/mlx5_crypto.c

346 lines
9.2 KiB
C
Raw Permalink Normal View History

/* SPDX-License-Identifier: BSD-3-Clause
* Copyright (c) 2022 NVIDIA CORPORATION & AFFILIATES. All rights reserved.
*/
#include <rdma/rdma_cma.h>
#include <infiniband/verbs.h>
#include <infiniband/mlx5dv.h>
#include "spdk/stdinc.h"
#include "spdk/queue.h"
#include "spdk/log.h"
#include "spdk/likely.h"
#include "spdk/util.h"
#include "spdk_internal/mlx5.h"
#include "spdk_internal/rdma.h"
#define MLX5_VENDOR_ID_MELLANOX 0x2c9
/* Plaintext key sizes */
/* 64b keytag */
#define SPDK_MLX5_AES_XTS_KEYTAG_SIZE 8
/* key1_128b + key2_128b */
#define SPDK_MLX5_AES_XTS_128_DEK_BYTES 32
/* key1_256b + key2_256b */
#define SPDK_MLX5_AES_XTS_256_DEK_BYTES 64
/* key1_128b + key2_128b + 64b_keytag */
#define SPDK_MLX5_AES_XTS_128_DEK_BYTES_WITH_KEYTAG (SPDK_MLX5_AES_XTS_128_DEK_BYTES + SPDK_MLX5_AES_XTS_KEYTAG_SIZE)
/* key1_256b + key2_256b + 64b_keytag */
#define SPDK_MLX5_AES_XTS_256_DEK_BYTES_WITH_KEYTAG (SPDK_MLX5_AES_XTS_256_DEK_BYTES + SPDK_MLX5_AES_XTS_KEYTAG_SIZE)
struct spdk_mlx5_crypto_dek {
struct mlx5dv_dek *dek_obj;
struct ibv_pd *pd;
struct ibv_context *context;
};
struct spdk_mlx5_crypto_keytag {
struct spdk_mlx5_crypto_dek *deks;
uint32_t deks_num;
bool has_keytag;
char keytag[8];
};
struct ibv_context **
spdk_mlx5_crypto_devs_get(int *dev_num)
{
struct ibv_context **rdma_devs, **rdma_devs_out = NULL, *dev;
struct ibv_device_attr dev_attr;
struct mlx5dv_context dv_dev_attr;
int num_rdma_devs = 0, i, rc;
int num_crypto_devs = 0;
/* query all devices, save mlx5 with crypto support */
rdma_devs = rdma_get_devices(&num_rdma_devs);
if (!rdma_devs || !num_rdma_devs) {
*dev_num = 0;
return NULL;
}
rdma_devs_out = calloc(num_rdma_devs + 1, sizeof(*rdma_devs_out));
if (!rdma_devs_out) {
SPDK_ERRLOG("Memory allocation failed\n");
return NULL;
}
for (i = 0; i < num_rdma_devs; i++) {
dev = rdma_devs[i];
rc = ibv_query_device(dev, &dev_attr);
if (rc) {
SPDK_ERRLOG("Failed to query dev %s, skipping\n", dev->device->name);
continue;
}
if (dev_attr.vendor_id != MLX5_VENDOR_ID_MELLANOX) {
SPDK_DEBUGLOG(mlx5, "dev %s is not Mellanox device, skipping\n", dev->device->name);
continue;
}
memset(&dv_dev_attr, 0, sizeof(dv_dev_attr));
dv_dev_attr.comp_mask |= MLX5DV_CONTEXT_MASK_CRYPTO_OFFLOAD;
rc = mlx5dv_query_device(dev, &dv_dev_attr);
if (rc) {
SPDK_ERRLOG("Failed to query mlx5 dev %s, skipping\n", dev->device->name);
continue;
}
if (!(dv_dev_attr.crypto_caps.flags & MLX5DV_CRYPTO_CAPS_CRYPTO)) {
SPDK_DEBUGLOG(mlx5, "dev %s crypto engine doesn't support crypto, skipping\n", dev->device->name);
continue;
}
if (!(dv_dev_attr.crypto_caps.crypto_engines & (MLX5DV_CRYPTO_ENGINES_CAP_AES_XTS |
MLX5DV_CRYPTO_ENGINES_CAP_AES_XTS_SINGLE_BLOCK))) {
SPDK_DEBUGLOG(mlx5, "dev %s crypto engine doesn't support AES_XTS, skipping\n", dev->device->name);
continue;
}
if (dv_dev_attr.crypto_caps.wrapped_import_method &
MLX5DV_CRYPTO_WRAPPED_IMPORT_METHOD_CAP_AES_XTS) {
SPDK_WARNLOG("dev %s uses wrapped import method (0x%x) which is not supported by mlx5 accel module\n",
dev->device->name, dv_dev_attr.crypto_caps.wrapped_import_method);
continue;
}
SPDK_NOTICELOG("Crypto dev %s\n", dev->device->name);
rdma_devs_out[num_crypto_devs++] = dev;
}
if (!num_crypto_devs) {
SPDK_DEBUGLOG(mlx5, "Found no mlx5 crypto devices\n");
goto err_out;
}
rdma_free_devices(rdma_devs);
*dev_num = num_crypto_devs;
return rdma_devs_out;
err_out:
free(rdma_devs_out);
rdma_free_devices(rdma_devs);
*dev_num = 0;
return NULL;
}
void
spdk_mlx5_crypto_devs_release(struct ibv_context **rdma_devs)
{
if (rdma_devs) {
free(rdma_devs);
}
}
void
spdk_mlx5_crypto_keytag_destroy(struct spdk_mlx5_crypto_keytag *keytag)
{
struct spdk_mlx5_crypto_dek *dek;
uint32_t i;
if (!keytag) {
return;
}
for (i = 0; i < keytag->deks_num; i++) {
dek = &keytag->deks[i];
if (dek->dek_obj) {
mlx5dv_dek_destroy(dek->dek_obj);
}
if (dek->pd) {
spdk_rdma_put_pd(dek->pd);
}
}
spdk_memset_s(keytag->keytag, sizeof(keytag->keytag), 0, sizeof(keytag->keytag));
free(keytag->deks);
free(keytag);
}
int
spdk_mlx5_crypto_keytag_create(struct spdk_mlx5_crypto_dek_create_attr *attr,
struct spdk_mlx5_crypto_keytag **out)
{
struct spdk_mlx5_crypto_dek *dek;
struct spdk_mlx5_crypto_keytag *keytag;
struct ibv_context **devs;
struct mlx5dv_dek_init_attr init_attr = {};
struct mlx5dv_dek_attr query_attr;
int num_devs = 0, i, rc;
bool has_keytag;
if (!attr || !attr->dek) {
return -EINVAL;
}
switch (attr->dek_len) {
case SPDK_MLX5_AES_XTS_128_DEK_BYTES_WITH_KEYTAG:
init_attr.key_size = MLX5DV_CRYPTO_KEY_SIZE_128;
has_keytag = true;
SPDK_DEBUGLOG(mlx5, "128b AES_XTS with keytag\n");
break;
case SPDK_MLX5_AES_XTS_256_DEK_BYTES_WITH_KEYTAG:
init_attr.key_size = MLX5DV_CRYPTO_KEY_SIZE_256;
has_keytag = true;
SPDK_DEBUGLOG(mlx5, "256b AES_XTS with keytag\n");
break;
case SPDK_MLX5_AES_XTS_128_DEK_BYTES:
init_attr.key_size = MLX5DV_CRYPTO_KEY_SIZE_128;
has_keytag = false;
SPDK_DEBUGLOG(mlx5, "128b AES_XTS\n");
break;
case SPDK_MLX5_AES_XTS_256_DEK_BYTES:
init_attr.key_size = MLX5DV_CRYPTO_KEY_SIZE_256;
has_keytag = false;
SPDK_DEBUGLOG(mlx5, "256b AES_XTS\n");
break;
default:
SPDK_ERRLOG("Invalid key length %zu. The following keys are supported:\n"
"128b key + key2, %u bytes;\n"
"256b key + key2, %u bytes\n"
"128b key + key2 + keytag, %u bytes\n"
"256b lye + key2 + keytag, %u bytes\n",
attr->dek_len, SPDK_MLX5_AES_XTS_128_DEK_BYTES, MLX5DV_CRYPTO_KEY_SIZE_256,
SPDK_MLX5_AES_XTS_128_DEK_BYTES_WITH_KEYTAG, SPDK_MLX5_AES_XTS_256_DEK_BYTES_WITH_KEYTAG);
return -EINVAL;
}
devs = spdk_mlx5_crypto_devs_get(&num_devs);
if (!devs || !num_devs) {
SPDK_DEBUGLOG(mlx5, "No crypto devices found\n");
return -ENOTSUP;
}
keytag = calloc(1, sizeof(*keytag));
if (!keytag) {
SPDK_ERRLOG("Memory allocation failed\n");
spdk_mlx5_crypto_devs_release(devs);
return -ENOMEM;
}
keytag->deks = calloc(num_devs, sizeof(struct spdk_mlx5_crypto_dek));
if (!keytag->deks) {
SPDK_ERRLOG("Memory allocation failed\n");
spdk_mlx5_crypto_devs_release(devs);
free(keytag);
return -ENOMEM;
}
for (i = 0; i < num_devs; i++) {
keytag->deks_num++;
dek = &keytag->deks[i];
dek->pd = spdk_rdma_get_pd(devs[i]);
if (!dek->pd) {
SPDK_ERRLOG("Failed to get PD on device %s\n", devs[i]->device->name);
rc = -EINVAL;
goto err_out;
}
dek->context = devs[i];
init_attr.pd = dek->pd;
init_attr.has_keytag = has_keytag;
init_attr.key_purpose = MLX5DV_CRYPTO_KEY_PURPOSE_AES_XTS;
init_attr.comp_mask = MLX5DV_DEK_INIT_ATTR_CRYPTO_LOGIN;
init_attr.crypto_login = NULL;
memcpy(init_attr.key, attr->dek, attr->dek_len);
dek->dek_obj = mlx5dv_dek_create(dek->context, &init_attr);
spdk_memset_s(init_attr.key, sizeof(init_attr.key), 0, sizeof(init_attr.key));
if (!dek->dek_obj) {
SPDK_ERRLOG("mlx5dv_dek_create failed on dev %s, errno %d\n", dek->context->device->name, errno);
rc = -EINVAL;
goto err_out;
}
memset(&query_attr, 0, sizeof(query_attr));
rc = mlx5dv_dek_query(dek->dek_obj, &query_attr);
if (rc) {
SPDK_ERRLOG("Failed to query DEK on dev %s, rc %d\n", dek->context->device->name, rc);
goto err_out;
}
if (query_attr.state != MLX5DV_DEK_STATE_READY) {
SPDK_ERRLOG("DEK on dev %s state %d\n", dek->context->device->name, query_attr.state);
rc = -EINVAL;
goto err_out;
}
}
if (has_keytag) {
/* Save keytag, it will be used to configure crypto MKEY */
keytag->has_keytag = true;
memcpy(keytag->keytag, attr->dek + attr->dek_len - SPDK_MLX5_AES_XTS_KEYTAG_SIZE,
SPDK_MLX5_AES_XTS_KEYTAG_SIZE);
}
spdk_mlx5_crypto_devs_release(devs);
*out = keytag;
return 0;
err_out:
spdk_mlx5_crypto_keytag_destroy(keytag);
spdk_mlx5_crypto_devs_release(devs);
return rc;
}
static inline struct spdk_mlx5_crypto_dek *
mlx5_crypto_get_dek_by_pd(struct spdk_mlx5_crypto_keytag *keytag, struct ibv_pd *pd)
{
struct spdk_mlx5_crypto_dek *dek;
uint32_t i;
for (i = 0; i < keytag->deks_num; i++) {
dek = &keytag->deks[i];
if (dek->pd == pd) {
return dek;
}
}
return NULL;
}
int
spdk_mlx5_crypto_set_attr(struct mlx5dv_crypto_attr *attr_out,
struct spdk_mlx5_crypto_keytag *keytag, struct ibv_pd *pd,
uint32_t block_size, uint64_t iv, bool encrypt_on_tx)
{
struct spdk_mlx5_crypto_dek *dek;
enum mlx5dv_block_size bs;
dek = mlx5_crypto_get_dek_by_pd(keytag, pd);
if (spdk_unlikely(!dek)) {
SPDK_ERRLOG("No DEK for pd %p (dev %s)\n", pd, pd->context->device->name);
return -EINVAL;
}
switch (block_size) {
case 512:
bs = MLX5DV_BLOCK_SIZE_512;
break;
case 520:
bs = MLX5DV_BLOCK_SIZE_520;
break;
case 4048:
bs = MLX5DV_BLOCK_SIZE_4048;
break;
case 4096:
bs = MLX5DV_BLOCK_SIZE_4096;
break;
case 4160:
bs = MLX5DV_BLOCK_SIZE_4160;
break;
default:
SPDK_ERRLOG("Unsupported block size %u\n", block_size);
return -EINVAL;
}
memset(attr_out, 0, sizeof(*attr_out));
attr_out->dek = dek->dek_obj;
attr_out->crypto_standard = MLX5DV_CRYPTO_STANDARD_AES_XTS;
attr_out->data_unit_size = bs;
attr_out->encrypt_on_tx = encrypt_on_tx;
memcpy(attr_out->initial_tweak, &iv, sizeof(iv));
if (keytag->has_keytag) {
memcpy(attr_out->keytag, keytag->keytag, sizeof(keytag->keytag));
}
return 0;
}
SPDK_LOG_REGISTER_COMPONENT(mlx5)